Information Technology Reference
In-Depth Information
The result for checking criterion 1 is the OSCV found. It means that there is some
incorrectness in the security setup followed with security violation. After analyzing
the unsafe state, VCPU discloses nature of security flaw, detecting subjects, objects,
and their attributes that lead to protection weakness. The evaluation verdict is " system
is unsafe by the given criterion ", because members of ' Users ' have the ' Read Data ' and
' Write Data ' access in the ACL, corresponding to Normal.dot .
5 Conclusion
In this paper, we addressed to formal basics of OSCVs verification approach for
secure operating systems. We discussed a technique of the vulnerabilities analysis and
a formal processing tool, the VCPU. All these allow to specify the system security-
related elements and proof the system safety.
The VCPU facility brings our vulnerability checking method to practice. The
targets of its applications (being integrated into SEW toolkit) are the computer
systems based on the granular security: the operating systems, DBMSs, and firewalls.
Our approach is very useful for administrators and security officers to monitor the
system securable resources (files, shared folders, printers, accounts, etc). It allows any
user to discover security of her or his system in the depth, and thus open the 'holes' in
the protection. The OSCVs, as mentioned, represent a very serious problem in the
modern operating systems. Contemporary systems operate with a huge number of
security settings, and the user needs some tools that could explain the whys and
wherefores of security weaknesses. The VCPU utility makes this process closer to
person than ever, because while logical resolving it marks the clause that caused fault
of OSCV-criterion, and supplies user with a true reason of the security flaw.
References
1. Saltzer, J., Schroeder, M.: The Protection of Information in Computer Systems. Proceedings
of the IEEE, Vol. 63(9) (1975) 1278-1308
2. Hoare C.A.R.: Communicating Sequential Processes. Communications of the ACM, vol.
21(8) (1978) 666-674
3. Banatre, J.-P., Bryce, C.: A Security Proof System for Networks of Communicating
Processes, Irisa Research Report, #2042, 60 pp. (1993)
4. Jaurjens,J., Shabalin,P.: Automated Verification of UMLsec Models for Security
Requirements. 7th International Conf. on the UML (2004) 365-379
5. Jaurjens, J.: UMLsec: Extending UML for secure systems development. UML 2002,
Vol. 2460 (2002) 412-425
6. Heydon, A., Maimone, M.W., Tygar, J.D., Wing, J.M., Zaremski, A.M.: Miro: Visual
Specification of Security. IEEE Transactions on Software Engineering, 16(10) (1990)
1185-1197
7. Heydon, A., Tygar, J.D.: Specifying and Checking Unix Security Constraints, In UNIX
Security Symposium III Proc. (1992) 211-226
8. Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O.: Logical Resolving for Security Evaluation,
MMM-ACNS (2003) 147-156
 
Search WWH ::




Custom Search